What is Saiber Storm

What is it? Saiber Storm is a platform that will become the next great training platform for cyber security. We are taking material that would normally be found in a textbook and bringing it into the real world. The way we go about doing that is through virtual machines.

In computing, a virtual machine (VM) is an emulation of a given computer system.Virtual machines operate based on the computer architecture and functions of a real or hypothetical computer, and their implementations may involve specialized hardware, software, or a combination.

By doing this we are protecting you from yourself, in the sense that you can and should break the environment that we have setup for you. However, it is very hard to do something in the virtual machine that would break you main machine. We also monitor what is going on in the virtual machine to show you changes in the system that you might have not known would make your computer more secure.

Now on to more technical information about the platform.

Types of Vulnerabilities (planned)

We are working to be able to provide the most robust checking abilities. All of the below are types of vulnerability checks. A vulnerability check is a specific setting or configuration within the machine that we want the competitor/student to be able to identify and properly configure.

Cross Platform

  1. Files
  2. Questions
  3. Hosts
  4. Users
  5. User Groups
  6. Services
  7. Processes
  8. Firewall
  9. Shares
  10. File Metadata
  11. Ports

Windows Only

  1. Local Security Policies
  2. Registry

Linux Only

  1. Sudoers
  2. sysctl
  3. LightDM
  4. apt
  5. yum

macOS Only

  1. Library
  2. pList
  3. Brew

Software Support

  1. mySQL
  2. mongoDB
  3. vsftpd
  4. fileZilla
  5. proFTPD
  6. OpenSSH

If you have any questions as to the date of completion or about anything really, please shoot me an email at ryan.gurnick@net-force.net